Podcast
Questions and Answers
What type of plagiarism includes submitting one's own prior work without permission from all relevant teachers?
What type of plagiarism includes submitting one's own prior work without permission from all relevant teachers?
Which type of plagiarism is characterized by failing to mention sources and not giving credit to the original author?
Which type of plagiarism is characterized by failing to mention sources and not giving credit to the original author?
What aspect does the 'Author' refer to in evaluating information accuracy?
What aspect does the 'Author' refer to in evaluating information accuracy?
What characteristic is associated with Fair Use of intellectual property?
What characteristic is associated with Fair Use of intellectual property?
Signup and view all the answers
Which type of plagiarism involves using sources without putting them in quotes or using synonyms for the author's words?
Which type of plagiarism involves using sources without putting them in quotes or using synonyms for the author's words?
Signup and view all the answers
What was the founding date of Microsoft?
What was the founding date of Microsoft?
Signup and view all the answers
What is the category of property that includes intangible creations of the human intellect?
What is the category of property that includes intangible creations of the human intellect?
Signup and view all the answers
Which type of malware can spread through text messages?
Which type of malware can spread through text messages?
Signup and view all the answers
What is the legal phrase that describes the rights authors and artists have over their literary and artistic creations?
What is the legal phrase that describes the rights authors and artists have over their literary and artistic creations?
Signup and view all the answers
Which intellectual property right protects confidential information that may be sold or licensed?
Which intellectual property right protects confidential information that may be sold or licensed?
Signup and view all the answers
What is considered copyright infringement?
What is considered copyright infringement?
Signup and view all the answers
Which sign is capable of distinguishing goods or services of one enterprise from those of others?
Which sign is capable of distinguishing goods or services of one enterprise from those of others?
Signup and view all the answers
What is the main difference between phishing and spear-phishing?
What is the main difference between phishing and spear-phishing?
Signup and view all the answers
How can some worm variants infiltrate a system according to the text?
How can some worm variants infiltrate a system according to the text?
Signup and view all the answers
What is a common method used by malware like worms to spread across networks?
What is a common method used by malware like worms to spread across networks?
Signup and view all the answers
Which of the following methods does adware use to generate revenue?
Which of the following methods does adware use to generate revenue?
Signup and view all the answers
What is a risk associated with file sharing on P2P networks according to the text?
What is a risk associated with file sharing on P2P networks according to the text?
Signup and view all the answers
How do certain types of worms spread without human activation as mentioned in the text?
How do certain types of worms spread without human activation as mentioned in the text?
Signup and view all the answers
Study Notes
Internet Threats
- Malware refers to software designed to disrupt computers, servers, clients, or computer networks, leak sensitive data, or obtain unauthorized access to data.
- Types of malware include:
- Trojan: conceals malicious malware in genuine applications
- Rogue Security Software: a type of malicious software and online fraud that tricks consumers
- Worm: malware that can spread or self-replicate from one computer to another without human activation
- Spyware: placed on a computer without the end user's knowledge
- Keylogger: secretly records the keys pressed on a keyboard
- Adware: advertisement-supported software that makes money for its creators by displaying banner ads
- Spam messages can include malware
How Does a Computer Malware Spread
- Phishing: fraudulent emails that look authentic can carry worms in corrupt attachments
- Spear-Phishing: targeted phishing attempts can carry dangerous malware
- Networks: worms can self-replicate across networks via shared access
- Security holes: some worm variants can infiltrate a system by exploiting software vulnerabilities
- File sharing: P2P file networks can carry malware like worms
- Social networks: social platforms like MySpace have been affected by certain types of worms
- Instant messengers (IMs): all types of malware, including worms, can spread through text messages
- External devices: worms can infect USB sticks and external hard drives
Intellectual Property Rights
- Intellectual Property (IP) refers to intangible creations of the human intellect
- Intellectual property rights are the rights granted to individuals over their creative works
- Types of intellectual property rights include:
- Copyright: a legal phrase that describes the rights that authors and artists have over their literary and artistic creations
- Trade secrets: intellectual property rights on confidential information
- Trademark: a sign capable of distinguishing the goods or services of one enterprise from those of other enterprises
- Patent: an exclusive right granted for an invention
Copyright Infringement and Plagiarism
- Copyright infringement occurs when a copyrighted work is copied, distributed, performed, publicly displayed, or transformed into a derivative work without the owner's consent
- Types of plagiarism include:
- Direct plagiarism: unattributed, unmarked transcription of a passage from another person's work
- Self-plagiarism: submitting one's own prior work or combining portions of prior works without permission
- Mosaic plagiarism: using source material without putting them in quotes or finding synonyms for the author's words
- Accidental plagiarism: failing to mention sources without giving due credit to the original author
- Fair use means that an intellectual property may be used without consent
Contextualized Online Search and Research Skills
- Online search: utilizing the Internet as a tool for reliable information gathering and research
- Evaluating information accuracy: content is grammatically correct, verifiable, and cited when necessary
- Author: defines who created the content, the individual or group's credentials, and provides contact information
- Currency: information is current and updated frequently
- Fairness: content is balanced, presenting all sides of an issue and multiple points of view
- Use of search engines: search engines are programs that look for documents based on specified keywords
- Relevance: content is relevant to the topic or research
Microsoft Office
- Microsoft was founded by Paul Allen and Bill Gates on April 4, 1975
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Description
This quiz covers different types of plagiarism including Direct, Self, Mosaic, and Accidental, along with the concept of Fair Use. Test your knowledge on properly attributing sources and avoiding academic misconduct.